Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2022-42327

Опубликовано: 01 нояб. 2022
Источник: debian
EPSS Низкий

Описание

x86: unintended memory sharing between guests On Intel systems that support the "virtualize APIC accesses" feature, a guest can read and write the global shared xAPIC page by moving the local APIC out of xAPIC mode. Access to this shared page bypasses the expected isolation that should exist between two guests.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
xenfixed4.16.2+90-g0d39a6d1ae-1package
xennot-affectedbullseyepackage
xennot-affectedbusterpackage

Примечания

  • https://xenbits.xen.org/xsa/advisory-412.html

EPSS

Процентиль: 1%
0.00012
Низкий

Связанные уязвимости

CVSS3: 7.1
ubuntu
больше 3 лет назад

x86: unintended memory sharing between guests On Intel systems that support the "virtualize APIC accesses" feature, a guest can read and write the global shared xAPIC page by moving the local APIC out of xAPIC mode. Access to this shared page bypasses the expected isolation that should exist between two guests.

CVSS3: 7.1
nvd
больше 3 лет назад

x86: unintended memory sharing between guests On Intel systems that support the "virtualize APIC accesses" feature, a guest can read and write the global shared xAPIC page by moving the local APIC out of xAPIC mode. Access to this shared page bypasses the expected isolation that should exist between two guests.

CVSS3: 7.1
github
больше 3 лет назад

x86: unintended memory sharing between guests On Intel systems that support the "virtualize APIC accesses" feature, a guest can read and write the global shared xAPIC page by moving the local APIC out of xAPIC mode. Access to this shared page bypasses the expected isolation that should exist between two guests.

suse-cvrf
около 3 лет назад

Security update for xen

EPSS

Процентиль: 1%
0.00012
Низкий